If you are using a device which uses the WebAuthn standard, you can visit this page to make sure your broswer supports it. If you are using Apple Touch ID on a laptop, make sure that you have activated Touch ID and provided a fingerprint before attempting to add it to your account. Please check with your security key manufacturer to make sure that you are using a browser that supports your device. In order to use a security key the browser you use must support the appropriate software for the key you have purchased. This includes, but is not limited to FIDO U2F security keys (such as Yubico keys), Ledger and other security wallets, and Apple Touch ID. ![]() Gandi supports both U2F and WebAuthn compliant software devices. You will plug the key into your computer to verify your identity each time you log in to Gandi. To use a security key you need to have purchased a physical device which you will then need to have with you every time you log in to your Gandi account. “Security key” refers to a collection of physical devices which you connect to your computer to act as a secondary authentication of identity on an account. You can also see if members of your team have activated two-factor identification by looking at your sharing settings. ![]() You will only need to provide one of the authentication methods to enter your account. If you don’t have your security key available you will then be asked to provide a TOTP code. When you log in you will be asked for your security key first. ![]() We recommend using both so that you can log in using a TOTP code if your security device is broken or lost. You can activate both security keys and TOTP at the same time to have the option of using either method. When you activate two-factor authentication on your Gandi account you will provide both your regular password and an additional code generated either from an app–usually on your mobile device (TOTP), or from a USB device you plug into your computer (U2F). Two-factor authentication refers to the security practice of requiring two different types of verification to prove your identity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |